From: Jordan Justen <jordan.l.justen@intel.com>
To: "Laszlo Ersek" <lersek@redhat.com>,
"Marvin Häuser" <Marvin.Haeuser@outlook.com>,
"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Subject: Re: [PATCH v4] OvmfPkg/ResetVector: Depend on PCD values of the page tables.
Date: Fri, 04 Nov 2016 15:38:27 -0700 [thread overview]
Message-ID: <147829910764.11627.2691984297559573830@jljusten-ivb> (raw)
In-Reply-To: <53f2a4d0-84b6-6831-9f13-6e1b53d4303a@redhat.com>
On 2016-11-04 15:27:48, Laszlo Ersek wrote:
> On 11/04/16 14:32, Marvin Häuser wrote:
> > Currently, the value of the page tables' address is hard-coded in the
> > ResetVector. This patch replaces these values with a PCD dependency.
> >
> > A check for the size has been added to alert the developer to rewrite
> > the ASM according to the new size, if it has been changed.
> >
> > Contributed-under: TianoCore Contribution Agreement 1.0
> > Signed-off-by: Marvin Haeuser <Marvin.Haeuser@outlook.com>
> > ---
> > OvmfPkg/ResetVector/Ia32/PageTables64.asm | 23 ++++++++++----------
> > OvmfPkg/ResetVector/ResetVector.inf | 5 +++++
> > OvmfPkg/ResetVector/ResetVector.nasmb | 7 ++++++
> > 3 files changed, 24 insertions(+), 11 deletions(-)
> >
> > diff --git a/OvmfPkg/ResetVector/Ia32/PageTables64.asm b/OvmfPkg/ResetVector/Ia32/PageTables64.asm
> > index b5a4cf8d7187..6201cad1f5dc 100644
> > --- a/OvmfPkg/ResetVector/Ia32/PageTables64.asm
> > +++ b/OvmfPkg/ResetVector/Ia32/PageTables64.asm
> > @@ -44,10 +44,11 @@ BITS 32
> > SetCr3ForPageTables64:
> >
> > ;
> > - ; For OVMF, build some initial page tables at 0x800000-0x806000.
> > + ; For OVMF, build some initial page tables at
> > + ; PcdOvmfSecPageTablesBase - (PcdOvmfSecPageTablesBase + 0x6000).
> > ;
> > - ; This range should match with PcdOvmfSecPageTablesBase and
> > - ; PcdOvmfSecPageTablesSize which are declared in the FDF files.
> > + ; This range should match with PcdOvmfSecPageTablesSize which is
> > + ; declared in the FDF files.
> > ;
> > ; At the end of PEI, the pages tables will be rebuilt into a
> > ; more permanent location by DxeIpl.
> > @@ -56,21 +57,21 @@ SetCr3ForPageTables64:
> > mov ecx, 6 * 0x1000 / 4
> > xor eax, eax
> > clearPageTablesMemoryLoop:
> > - mov dword[ecx * 4 + 0x800000 - 4], eax
> > + mov dword[ecx * 4 + PT_ADDR (0) - 4], eax
> > loop clearPageTablesMemoryLoop
> >
> > ;
> > ; Top level Page Directory Pointers (1 * 512GB entry)
> > ;
> > - mov dword[0x800000], 0x801000 + PAGE_PDP_ATTR
> > + mov dword[PT_ADDR (0)], PT_ADDR (0x1000) + PAGE_PDP_ATTR
> >
> > ;
> > ; Next level Page Directory Pointers (4 * 1GB entries => 4GB)
> > ;
> > - mov dword[0x801000], 0x802000 + PAGE_PDP_ATTR
> > - mov dword[0x801008], 0x803000 + PAGE_PDP_ATTR
> > - mov dword[0x801010], 0x804000 + PAGE_PDP_ATTR
> > - mov dword[0x801018], 0x805000 + PAGE_PDP_ATTR
> > + mov dword[PT_ADDR (0x1000)], PT_ADDR (0x2000) + PAGE_PDP_ATTR
> > + mov dword[PT_ADDR (0x1008)], PT_ADDR (0x3000) + PAGE_PDP_ATTR
> > + mov dword[PT_ADDR (0x1010)], PT_ADDR (0x4000) + PAGE_PDP_ATTR
> > + mov dword[PT_ADDR (0x1018)], PT_ADDR (0x5000) + PAGE_PDP_ATTR
> >
> > ;
> > ; Page Table Entries (2048 * 2MB entries => 4GB)
> > @@ -81,13 +82,13 @@ pageTableEntriesLoop:
> > dec eax
> > shl eax, 21
> > add eax, PAGE_2M_PDE_ATTR
> > - mov [ecx * 8 + 0x802000 - 8], eax
> > + mov [ecx * 8 + PT_ADDR (0x2000 - 8)], eax
> > loop pageTableEntriesLoop
> >
> > ;
> > ; Set CR3 now that the paging structures are available
> > ;
> > - mov eax, 0x800000
> > + mov eax, PT_ADDR (0)
> > mov cr3, eax
> >
> > OneTimeCallRet SetCr3ForPageTables64
> > diff --git a/OvmfPkg/ResetVector/ResetVector.inf b/OvmfPkg/ResetVector/ResetVector.inf
> > index 46610d243ecf..d1e5d4d9bdea 100644
> > --- a/OvmfPkg/ResetVector/ResetVector.inf
> > +++ b/OvmfPkg/ResetVector/ResetVector.inf
> > @@ -29,9 +29,14 @@ [Sources]
> > ResetVector.nasmb
> >
> > [Packages]
> > + OvmfPkg/OvmfPkg.dec
> > MdePkg/MdePkg.dec
> > UefiCpuPkg/UefiCpuPkg.dec
> >
> > [BuildOptions]
> > *_*_IA32_NASMB_FLAGS = -I$(WORKSPACE)/UefiCpuPkg/ResetVector/Vtf0/
> > *_*_X64_NASMB_FLAGS = -I$(WORKSPACE)/UefiCpuPkg/ResetVector/Vtf0/
> > +
> > +[Pcd]
> > + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase
> > + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
> > diff --git a/OvmfPkg/ResetVector/ResetVector.nasmb b/OvmfPkg/ResetVector/ResetVector.nasmb
> > index 31ac06ae4a8c..29cbad367711 100644
> > --- a/OvmfPkg/ResetVector/ResetVector.nasmb
> > +++ b/OvmfPkg/ResetVector/ResetVector.nasmb
> > @@ -53,6 +53,13 @@
> > %include "Ia32/SearchForSecEntry.asm"
> >
> > %ifdef ARCH_X64
> > + #include <AutoGen.h>
> > +
> > + %if (FixedPcdGet32 (PcdOvmfSecPageTablesSize) != 0x6000)
> > + %error "This implementation inherently depends on PcdOvmfSecPageTablesSize"
> > + %endif
> > +
> > + %define PT_ADDR(Offset) (FixedPcdGet32 (PcdOvmfSecPageTablesBase) + (Offset))
> > %include "Ia32/Flat32ToFlat64.asm"
> > %include "Ia32/PageTables64.asm"
> > %endif
> >
>
> I compared this patch to the one that I worked out / simplified from
> your v2 patch and posted as our shared v3:
>
> https://lists.01.org/pipermail/edk2-devel/2016-November/004140.html
>
> The differences are cosmetic.
>
> Reviewed-by: Laszlo Ersek <lersek@redhat.com>
> Tested-by: Laszlo Ersek <lersek@redhat.com>
>
> I could commit & push this now (I could even find the energy in me for
> that), but I'd like Jordan to okay the patch as well, in this form.
>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
next prev parent reply other threads:[~2016-11-04 22:38 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-11-04 13:32 [PATCH v4] OvmfPkg/ResetVector: Depend on PCD values of the page tables Marvin Häuser
2016-11-04 22:27 ` Laszlo Ersek
2016-11-04 22:38 ` Jordan Justen [this message]
2016-11-04 22:50 ` Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=147829910764.11627.2691984297559573830@jljusten-ivb \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox